Important: ntp

2016-02-09T13:30:00
ID ALAS-2016-649
Type amazon
Reporter Amazon
Modified 2016-02-09T13:30:00

Description

Issue Overview:

It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. (CVE-2015-8138 __)

A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash the ntpd process. (CVE-2015-7977 __)

It was found that NTP does not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key. (CVE-2015-7974 __)

A stack-based buffer overflow was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash the ntpd process. (CVE-2015-7978 __)

It was found that when NTP is configured in broadcast mode, an off-path attacker could broadcast packets with bad authentication (wrong key, mismatched key, incorrect MAC, etc) to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server. This could cause the time on affected clients to become out of sync over a longer period of time. (CVE-2015-7979 __)

A flaw was found in the way the ntpq client certain processed incoming packets in a loop in the getresponse() function. A remote attacker could potentially use this flaw to crash an ntpq client instance. (CVE-2015-8158 __)

A flaw was found in ntpd that allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time. (CVE-2016-4953 __)

(Updated 2016-10-18: CVE-2016-4953 __ was fixed in this release but was not previously part of this errata.)

Affected Packages:

ntp

Issue Correction:
Run yum update ntp to update your system.

New Packages:

i686:  
    ntp-4.2.6p5-36.29.amzn1.i686  
    ntpdate-4.2.6p5-36.29.amzn1.i686  
    ntp-debuginfo-4.2.6p5-36.29.amzn1.i686

noarch:  
    ntp-doc-4.2.6p5-36.29.amzn1.noarch  
    ntp-perl-4.2.6p5-36.29.amzn1.noarch

src:  
    ntp-4.2.6p5-36.29.amzn1.src

x86_64:  
    ntpdate-4.2.6p5-36.29.amzn1.x86_64  
    ntp-4.2.6p5-36.29.amzn1.x86_64  
    ntp-debuginfo-4.2.6p5-36.29.amzn1.x86_64